-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dependence on presence of MEI device #8
Comments
I'd be pretty surprised if mei_me is missing any PCI IDs for any vulnerable hardware. What kind of clarification would be helpful here? |
The MEI driver could be disabled completely, though presumably no distros do that. To be completely thorough it should grovel through lspci looking for any known MEI devices. |
Interesting results for Dell servers. For example, on PowerEdge R930, the MEI device is seen in lspci...
But the mei-amt-check output in question is output...
Doing modprobe mei_me, we see the driver is unable to interface with the device...
According to my Dell rep, while AMT is technically enabled in their servers (and can't be disabled by any BIOS setting), access from host OS or network interface is not possible...
Just posting all this for folks awareness; not expecting a solution. |
@swapdisk This issue is still current on multiple of my SuperMicro Intel systems.
|
just to chime in with my new SuperMicro X12DPi-N6 board:
|
It’d be great to get confirmation that the idea of the check program is correct as it claims to know if the AMT is disabled. From #[email protected].
The text was updated successfully, but these errors were encountered: